Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
May 17, 2021
Search
Highlight

Rewiring education: how technology can unlock every student’s potential
Back in 2001, Marc Prensky stated: “the single biggest problem facing education today is that our digital immigrant instructors, who speak an outdated language (that of the pre-digital age), are struggling to teach a population that speaks an entirely new language” [1]. The current... more
Quote
Software developers tend to view the world as if it were wrapped in a giant if-then-else statement. When faced with the challenge of solving a problem... more
- Frank P. Ginac (2000)
Articles
Technological research methodology to manage organizational change: TEEM 19

Change management is essential for all organizations to ensure that the desired benefits of the change process are actually achieved. This paper focuses on the design of a technological research methodology for... more

General (J.0) | May 14 21

Gradient algorithms for complex non-Gaussian independent component/vector extraction, question of convergence: IEEE Transactions on Signal Processing

Blind source separation/extraction (BSS/BSE) methods are widely applicable, from wireless communication to cosmic explorations. They are subsets of blind... more

Signal Processing (I.5.4...) | May 13 21

Implementing a modal dependent type theory: Proceedings of the ACM on Programming Languages

Modalities are widely used in mathematics and computer science as an abstraction tool, but it turns out to be difficult to incorporate them in rich type theories. The authors address this problem... more

General (D.3.0) | Apr 27 21

Exact algorithms via monotone local search: Journal of the ACM

Many important problems are NP-complete; this means that, unless P = NP, we cannot have a polynomial-time (feasible) algorithm for solving all instances of this problem. For each such problem, there is an... more

Search Process (H.3.3...) | Apr 26 21

Evaluating the effects of missing values and mixed data types on social sequence clustering using t-SNE visualization: Journal of Data and Information Quality

The authors discuss how one can compensate for missing values when clustering joint categorical sequences. For example, one might... more

Learning (I.2.6) | Apr 21 21

SOD: making smartphone smart on demand with radio interface management: ACM Transactions on Autonomous and Adaptive Systems

Smartphone batteries don’t last as long as they used to. Why? Applications consume a lot of energy. However, the authors show that, besides the display... more

General (B.0) | Apr 20 21

Data-parallel structural optimisation in agent-based models: ACM SIGEVOlution

Modeling is a tool for studying a natural phenomenon. The accuracy of such a model depends on how well the model mimics the behavior of the system under study. The modeling of phenomena in ecology, microbiology, social... more

Multiagent Systems (I.2.11...) | Apr 16 21

Data transparency with blockchain and AI ethics: Journal of Data and Information Quality

With the ever-growing use of digital technology, especially the use of big data technologies and machine learning, questions related to the proper use of data collected from social networks led to the... more

Ethics (K.4.1...) | Apr 14 21

An analysis of inheritance hierarchy evolution: EASE 19

This is a refreshing paper on ten open-source systems and their use of “inheritance” programing concepts. Computer languages have evolved with the type-safe extensibility concept of inheritance, which is embodied in object... more

General (D.2.0) | Apr 13 21

Modeling information retrieval by formal logic: a survey: ACM Computing Surveys

As the title indicates, formal logic is used for modeling information retrieval (IR). Readers can expect a literature review (of IR models), supported with graphs, mathematical formulas, and examples that... more

Retrieval Models (H.3.3...) | Apr 12 21

Books
Numerical analysis: theory and experiments

In the depressingly similar world of numerical analysis textbooks, Sutton’s book is a welcome relief. It is based on MATLAB, but differently to most. Many of the included methods are those not... more
Numerical Analysis (G.1) | May 17 21

The algorithm design manual (3rd ed.)

Algorithms have been around for a long time, for example, the Euclidean algorithm to find the maximum common divisor of two integers is about 2400 years old. Nowadays, though, “algorithm” refers to instructions executed by computers. Algorithm research is an extremely... more
Algorithm Design & Analysis (G.4...) | May 12 21

Righting software

The history of software systems development is filled with projects that have either failed or experienced severe problems, ranging from cost or schedule overruns to falling short of customer needs and serious quality defects. The rollout of the federal health insurance exchange website in the US... more
General (D.0) | May 11 21

Formal verification of control system software

This outstanding work manages to deal with key topics, many of which are highly advanced, while also being encyclopedic (in a good sense) within a mere 200 pages. In spite of its advanced nature, all levels of reader... more
Verification (D.4.5...) | May 10 21

Deep learning applications for cyber security

Research in the field of artificial intelligence (AI) provides new information about deep neural network (DNN)-based methods, also known as deep learning. This allows computational models, composed of countless processing layers, to learn... more
Learning (I.2.6) | May 7 21

Rewiring education: how technology can unlock every student’s potential

Back in 2001, Marc Prensky stated: “the single biggest problem facing education today is that our digital immigrant instructors, who speak an outdated language (that of the pre-digital age), are struggling to... more
Computer Uses in Education (K.3.1) | May 6 21

Modern data mining algorithms in C++ and CUDA C

In his earlier book from 2018, Data mining algorithms in C++ [1], the author indicated that a “volume 2 will appear some day.” This is it. It builds on the techniques and tools of the earlier book and follows a similar style of presentation. Each chapter presents a... more
C++ (D.3.2...) | May 5 21

Reasoning with probabilistic and deterministic graphical models: exact algorithms (2nd ed.)

Many problems related to learning and reasoning can make use of graphical models where a knowledge structure is compactly encoded into a graph. When dependencies (or independencies) among... more
Graphical Environments (D.2.6...) | May 4 21

Bandit algorithms

This book is on bandit algorithms. The word “bandit” is commonly understood to mean an armed thief who is usually a member of a group or band. However, in the context of this book, bandit refers to a type of slot machine with a large metal pole or handle... more
Learning (I.2.6) | May 3 21

The kollected Kode Vicious: opinionated advice for programmers

Readers of Communications of the ACM and ACM Queue are surely familiar with the magazines’ “Dear Abby”-like column, written by George V. Neville-Neil, under his persona Kode Vicious, or KV. This book is a... more
General (D.3.0) | Apr 30 21


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy